General

  • Target

    realspooferv7.4.exe

  • Size

    8.0MB

  • Sample

    240824-spe37axhkn

  • MD5

    5b30dddacaf3773c61d5597843e9cc33

  • SHA1

    ff1623aa569db820cde8a96e2f0dd80c3731b34c

  • SHA256

    10ebc0f4401936f551585ad775ca0f281904de3425aa142bcf5b26116c36c955

  • SHA512

    22ac7a7ef962d1aa8fdac05948c96d6b32b85d4d07047d19f322ab942499b5262ae09fa4d3604483f3182f9ca03eb4e223097f51b30793c83a7addbc8ae0d2df

  • SSDEEP

    196608:4RneSyb/3k2On488HVdgsnu4g7Z5eiv7JnkLvfGE:XDb/02OnyHI+u4g7pkLmE

Malware Config

Targets

    • Target

      realspooferv7.4.exe

    • Size

      8.0MB

    • MD5

      5b30dddacaf3773c61d5597843e9cc33

    • SHA1

      ff1623aa569db820cde8a96e2f0dd80c3731b34c

    • SHA256

      10ebc0f4401936f551585ad775ca0f281904de3425aa142bcf5b26116c36c955

    • SHA512

      22ac7a7ef962d1aa8fdac05948c96d6b32b85d4d07047d19f322ab942499b5262ae09fa4d3604483f3182f9ca03eb4e223097f51b30793c83a7addbc8ae0d2df

    • SSDEEP

      196608:4RneSyb/3k2On488HVdgsnu4g7Z5eiv7JnkLvfGE:XDb/02OnyHI+u4g7pkLmE

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks